Annals of Operations Research - Special issue on Tabu search
Computer
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Cryptanalysis of short secret exponents modulo RSA primes
Information Sciences—Informatics and Computer Science: An International Journal
A simple power analysis attack against the key schedule of the Camellia block cipher
Information Processing Letters
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Information Sciences: an International Journal
New combined attacks on block ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes
Information Sciences: an International Journal
Cryptanalysis of simplified-DES using computational intelligence
WSEAS Transactions on Computers
Hi-index | 0.07 |
Recent years have witnessed a significantly increased interest in computer security. Efforts in the area of design of ciphers and their attacks have progressed at almost competing rates. Though brute force attack is successful for simple ciphers, cryptanalysis of complex ciphers warrants specialised techniques and powerful computing systems. Several heuristic techniques have assumed significance over the past few years, in the context of attacks of simple stages of certain ciphers. This paper presents a systematic study of efficient heuristics in the successful attacks of some block ciphers which though simple are representative ones in computer security parlance.